Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate.
Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this [...]Continue Reading →
Organizations are more than ever exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change in the enterprises by supplying intelligence-driven models.
Research firm Gartner said that big data analytics will play a crucial role in [...]Continue Reading →
The cybercrime is a fairly recent phenomenon, but it has already proven its negative effects for computer users and companies around the world. Each year companies are spending millions of dollars to remove the malware installed by the botnet, which aim to steal personal information, such as data access or intellectual property.
[...]Continue Reading →
A series of cyber-assaults have recently targeted various banks all over the United States. A type of malware dubbed ‘itsokaynoproblembro’ or Brobot has reportedly been in action for a number of years, operating under the radar of various anti-virus programs. However, it is only recently that the virus has directly affected the [...]Continue Reading →
Security and compliance concerns are still major stumbling blocks to cloud adoption. According to a study by security firm Lieberman Software, nearly 48% of members of teams in business fear of government and legal interference before putting sensitive data in the cloud.
This is a survey to close more than 300 [...]Continue Reading →
A global survey has shown that it is very common that companies of all sizes suffer damage due to the use of public cloud applications that are not managed or integrated within the company’s IT infrastructure.
Symantec has released the results of a survey conducted by ReRez in the months of September [...]Continue Reading →
Cloud computing technology is one of the most transformative technologies in recent history, as it allows computers to perform tasks that are normally beyond their computing and storage capabilities. We have also seen that the amount of web applications available has increased rapidly as the consumer market starts to accept cloud computing. [...]Continue Reading →
Phishing is a popular scam to bait internet users into providing private information. It usually acquires information for the purpose of identity theft. A “phisher” usually sends emails to various individuals and claims to be a legitimate entity. People are duped into providing their personal information, mostly of financial nature, because they [...]Continue Reading →
As of May 28, Google’s cloud security reached a new high when Google Apps for Business earned ISO 27001 security certification. Although the news of the certification caused a lot of hype in both the business and the technology worlds, not many people are aware of just how important this security certification [...]Continue Reading →
Most businesses do have Disaster Recovery plans when it comes to their data but more than half of businesses still rely on onsite DR capabilities. According to Evault’s Andy Brewerton, everyone should consider migrating to the cloud, especially when it comes to protecting data.
Disasters do happen and these can affect your [...]Continue Reading →
The total fee for the data breach that Epsilon will face could reach as high as $4 billion, depending on what becomes of the data that was stolen, according to cyber-risk advisory firm. It’s a massive event that indicates the overlooked risk of cloud-based computing system.
According to a report by CyberFactors, [...]Continue Reading →
TagsAmazon Apple aws Big Data big data analytics big data solutions cloud Cloud computing cloud management Cloud Marketing cloud news cloud provider cloud providers Cloud Security CRM data center management Dev & Design Enterprise Enterprise Marketing ERP Gartner Google Government HP hybrid cloud IaaS ibm IDC Infrastructure-as-a-service microsoft mobile apps mobile cloud Openstack PaaS platform-as-a-service Private Cloud Public Cloud rackspace SaaS Salesforce.com Social Media software-as-a-service virtualization vmware weekly digest